You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Article
  • Open Access

18 January 2023

An Improved Lightweight User Authentication Scheme for the Internet of Medical Things

,
,
and
1
Department of Electrical and Computer Engineering, Sungkyunkwan University, 2066 Seobu-ro, Jangan-gu, Suwon-si 16419, Republic of Korea
2
Department of Computer Science and Engineering, Sungkyunkwan University, 2066 Seobu-ro, Jangan-gu, Suwon-si 16419, Republic of Korea
3
Department of IT Software Security, Howon University, 64 Impi-myeon, Howondae 3-gil, Gunsan-si 54058, Republic of Korea
4
Department of Computer Engineering, Sungkyunkwan University, 2066 Seobu-ro, Jangan-gu, Suwon-si 16419, Republic of Korea
This article belongs to the Special Issue Data and Privacy Management in Sensor Networks

Abstract

The Internet of Medical Things (IoMT) is used in the medical ecosystem through medical IoT sensors, such as blood glucose, heart rate, temperature, and pulse sensors. To maintain a secure sensor network and a stable IoMT environment, it is important to protect the medical IoT sensors themselves and the patient medical data they collect from various security threats. Medical IoT sensors attached to the patient’s body must be protected from security threats, such as being controlled by unauthorized persons or transmitting erroneous medical data. In IoMT authentication, it is necessary to be sensitive to the following attack techniques. (1) The offline password guessing attack easily predicts a healthcare administrator’s password offline and allows for easy access to the healthcare worker’s account. (2) Privileged-insider attacks executed through impersonation are an easy way for an attacker to gain access to a healthcare administrator’s environment. Recently, previous research proposed a lightweight and anonymity preserving user authentication scheme for IoT-based healthcare. However, this scheme was vulnerable to offline password guessing, impersonation, and privileged insider attacks. These attacks expose not only the patients’ medical data such as blood pressure, pulse, and body temperature but also the patients’ registration number, phone number, and guardian. To overcome these weaknesses, in the present study we propose an improved lightweight user authentication scheme for the Internet of Medical Things (IoMT). In our scheme, the hash function and XOR operation are used for operation in low-spec healthcare IoT sensor. The automatic cryptographic protocol tool ProVerif confirmed the security of the proposed scheme. Finally, we show that the proposed scheme is more secure than other protocols and that it has 266.48% better performance than schemes that have been previously described in other studies.

1. Introduction

The Internet of Medical Things (IoMT) represents a combination of the healthcare field and the IoT ecosystem that can be used to create, collect, transmit, and analyze medical data through the connection of various healthcare IT systems, healthcare sensors, and healthcare management programs [1,2]. With the continued evolution of IoT technology and the outbreak of COVID-19, IoMT gaining increased interest as it can enable personalized medical information management, real–time health tracking and monitoring but also remote treatment [3].
However, there may be various security problems in the IoMT environment when dealing with sensitive medical information [4,5], such as the following:
1.
First, if malicious cyberattacks can take control of healthcare sensors attached to a patient’s body, this might not only result in inaccurate data collection but also put the patient’s health at risk.
2.
Second, malicious cyberattacks can expose sensitive patient data and medical information.
3.
Third, since IoMT uses low–power wearable healthcare sensors, the protocol used is not lightweight, and it therefore may be difficult to operate normally or to provide real–time service due to the need for time–consuming computation.
Therefore, further develop the IoMT environment, it is crucial to maintain security for medical systems and IoT devices and to support lightweight security protocols for implementing them.
We implemented and analyzed a suitable scheme for IoMT using the following method. For safety, we not only use a simple password base but also introduce a fuzzy extractor, i.e., it is a biometric-based authentication method. We also propose a system model and an attack model to complement the weaknesses of Masud et al. [6]. We analyze the vulnerabilities of Masud et al. [6] based on the system model and attack model and propose our new IoMT scheme. We analyze the safety of the proposed scheme using a formal analysis and an informal analysis and calculate the cost of computation. Lastly, we analyze how efficient the computational cost is compared to those of other schemes.

1.1. Our Contribution

We proposed a secure and lightweight user authentication scheme for IoMT by improving on Masud et al. [6]’s scheme by addressing the possible threats involved. In summary, we make the following contributions:
1.
First, to overcome offline password-guessing attacks, we added biometrics authentication methods that can only authenticate the user when an actual user is present. Further, to protect against replay attacks, we added logic to ensure that the gateway authenticates the user and the freshness of the user’s message in the authentication phase. Finally, to overcome privileged insider attacks, we deleted the secret information that shared between the user and the sensor in the registration phase immediately following the registration phase.
2.
We proposed a lightweight security protocol that mainly uses a hash function and XOR operation to run low-spec healthcare sensors.
3.
The proposed scheme is designed to protect against various security threats such as offline password guessing attacks, privileged insider attacks, user impersonation attacks, replay attacks, and session key disclosure attacks. It also ensures user anonymity.

1.2. Organization of Our Paper

The rest of this paper is organized as follows: Section 3 presents the preliminaries about the fuzzy extractor, system model, and attack model. Section 4 presents the scheme reported by Masud et al. [6]. Section 5 demonstrates the scheme reported by Masud et al. [6]. Section 6 presents our improved scheme. Section 7 provides formal and informal security analysis. Section 8 provides a performance analysis. Section 9 provides discussion of performance. Finally, Section 10 presents our conclusion.

3. Preliminaries

In this section, we introduce the fuzzy extractor, the system model which we made, and the attack model. The details are as follows:

3.1. Fuzzy Extractor

Biometric information is the best way to authenticate and verify users [16,17,18]. In 2004, Dodis et al. [19] proposed the Fuzzy Extractor to obtain a unique bit string extracted from the biometric template. A fuzzy extractor is a tuple ( M , m e , l , τ , ϵ ) that has two algorithms Gen and Rep , which are expressed as follows [12]:
Gen ( w i ) = ( R i , P b i )
The above result means that the fuzzy extractor can generate the secret string R i and P b i . w i is a U i ’s original collected biometric data.
R e p ( w i , P b i ) = R i
The above result means that the fuzzy extractor can recover the secret string R i that is generated by the G e n algorithm.

3.2. System Model

Figure 1 shows the system model of the proposed scheme. In our scheme, there are three entities: the User, Medical Service Gateway (Gateway), and Healthcare IoT Sensor Node (Sensor Node).
Figure 1. The system model of our scheme in IoMT.
1.
Medical Service Gateway (Gateway): Since the user and the sensor node do not communicate with each other directly, the gateway is responsible for authentication and passing the communication between the user and the sensor node.
2.
Healthcare IoT Sensor Node (Sensor Node): The Healthcare IoT Sensor Node is attached to the patient’s body and collects the patient’s medical data. The Healthcare IoT Sensor Node is connected to the healthcare network and transmits the patient’s medical data to the user through a Gateway.
3.
Doctor (User): The user is a doctor who can access the patient’s medical information that has been collected from the sensor node to inform the patient’s treatment.

3.3. Attack Model

For security analysis in our scheme, we consider the following attack model [20,21,22]:
1.
The attacker can extract the data in the device that stores some security parameters.
2.
The attacker can access the public communication channel, at which point the attacker can interrupt, return, amend and eliminate or transmit the message.
3.
The attacker can calculate the identity and password in polynomial time.

4. Review of the Scheme Presented by Masud et al. [6]

In this section, we briefly review Masud et al.’s scheme [6] that only uses password protection to only let legitimate users access the IoT sensor node to obtain the patient’s health information. The notations and Masud et al. [6]’s scheme are described in Table 2 and Table 3, respectively.
Table 2. Notations.
Table 3. Masud et al.’s [6] scheme.
Masud et al. [6]’s scheme consists of three phases: the User Registration Phase, the Sensor Node Registration Phase, and the Mutual Authentication and Key Agreement Phase.

4.1. User Registration Phase

1.
The user enters and transmits D I D and P W D through the secured channel to the gateway.
2.
The gateway generates R S G 1 and computes D T I D = R S G 1 D I D and α = ( D I D R S G 1 ) P W D . The gateway stores D I D , P W D , R S G 1 and D T I D . Finally, the gateway transmits α through the secured channel to the user.
3.
The user derives R S G 1 * = ( α P W D ) D I D and computes D T I D = R S G 1 * D I D and β = h ( P W D R S G 1 * ) D T I D . The user then stores R S G 1 * , D T I D , and β .

4.2. Sensor Node Registration Phase

1.
The sensor node generates R S N 1 and then transmits R S N 1 and S I D through the secured channel to the gateway.
2.
The gateway generates R S G 2 and computes δ = ( S I D R S G 2 ) R S N 1 and S T I D = R S G 2 S I D . The gateway then stores S I D , R S N 1 , R S G 2 , and S T I D . Finally, the gateway transmits δ through the secured channel to the sensor.
3.
The sensor node computes R S G 2 * = ( δ R S N 1 ) S I D and S T I D = R S N 2 * S I D . The sensor node then stores R S N 1 , R S G 2 * , S T I D .

4.3. Mutual Authentication and Key Agreement Phase

1.
The user enters P W D and then computes Q = h ( P W D R S G 1 * ) D T I D , where R S G 1 * and D T I D . If Q and β are not equal, the procedure is stopped; if they are equal, the user generates N D 1 and computes N D 1 * = N D 1 P W D and λ = h ( R S G 1 * P W D ). Finally, the user transmits N D 1 * , D T I D , λ , and S T I D to the gateway.
2.
The gateway retrieves N D 1 = N D 1 * P W D , after which the gateway checks the freshness of N D 1 . If N D 1 is not fresh, the procedure is stopped; else the gateway compares D T I D and S T I D with the received values. If the values are not identical, the procedure is stopped; else the gateway computes λ * = h ( R S G 1 P W D ) . If λ * and λ are equal, the user authentication is successful. If they are not equal, the procedure is stopped. To share S K with the sensor node, the gateway generates N G 1 , S K , and R S G 3 . The gateway computes G W 1 = N G 1 S T I D , G W 2 = h ( R S N 1 R S G 2 ) , S K S = ( S K R S N 1 ) N G 1 and G W 3 = R S G 3 R S N 1 . Finally, the gateway stores G W 3 and transmits G W 1 , G W 2 , D T I D , S K S , and G W 3 through the public channel to the sensor node.
3.
The sensor node retrieves N G 1 = G W 1 S T I D and then checks the freshness of N G 1 . If N G 1 is not fresh, the procedure is stopped; else the sensor node computes S N 1 = h ( R S N 1 R S G 2 * ) . If S N 1 and G W 2 are equal, the gateway authentication is successful. Then, the sensor node retrieves S K = ( S K S R S N 1 ) N G 1 and the sensor node generates N S 1 and R S N 2 . The sensor node then computes S N 2 = N S 1 S T I D , S N 3 = h ( R S G 2 * R S N 1 S K ) , and S N 4 = R S G 2 * R S N 2 . Moreover, the sensor node retrieves R S G 3 = G W 3 R S N 1 and derives S T I D n e w = R S G 3 S I D . The sensor node stores R S N 2 , R S G 3 , S T I D n e w , and S N 3 . Finally, the sensor node transmits S N 2 , S N 3 , and S N 4 to the gateway.
4.
The gateway retrieves N S 1 = S N 2 S T I D and R S N 2 = S N 4 R S G 2 . The gateway then checks the freshness of N S 1 . If N S 1 is not fresh, the procedure is stopped; else the gateway computes G W 4 = h ( R S G 2 R S N 1 S K ) and S T I D n e w = S S G 3 S I D . If G W 4 and S N 3 are equal, the mutual authentication between the sensor node and the gateway is successful. Subsequently, the gateway stores R S N 2 , R S G 3 , and S T I D n e w . To share SK with the user, the gateway generates N G 2 and R S G 4 . The gateway then computes μ = D I D N G 2 , S K U = ( S K P W D ) N G 2 , η = h ( D I D P W D S K N G 2 ) , G W 5 = R S G 4 P W D and D T I D n e w = R S G 4 D I D . Finally the gateway stores R S G 4 and D T I D n e w and ultimately transmits μ , S K u , η , and G W 5 to the user.
5.
The user retrieves N G 2 = μ D I D . The user then checks the freshness of N G 2 . If N G 2 is not fresh, the procedure is stopped; else the user computes ϕ = h ( D I D P W D S K N G 2 ) . If ϕ and η are equal, the mutual authentication between the gateway and the user is successful. Then the user retrieves S K = ( S K U N G 2 ) P W D and R S G 4 = G W 5 P W D . The user computes D T I D n e w = R S G 4 D I D and stores R S G 4 and D T I D n e w .

5. Weaknesses of Masud et al. [6]’s Scheme

These weaknesses are listed under the assumption that the attacker has recorded the message ( N D 1 * , D T I D , λ , S T I D ) from a successful mutual authentication and key agreement of the user A.

5.1. Offline Password Guessing Attack

In an offline password guessing attack, the attacker is never actually attempting to login to the gateway server. Suppose the attacker steals the device of user A and obtains R S G 1 * from the device. Then, the attacker repeatedly guesses a password P W D * and computes λ * = h ( R S G 1 * P W D * ) offline. If λ * is equal to λ , the attacker can obtain the correct password P W D . Until the attacker determines a valid user’s password P W D , the gateway does not notice this attack at all because the attacker does not try to login.
Then, in the Mutual Authentication and Key Agreement Phase, the attacker retrieves D I D = R S G 1 * D T I D , N G 2 = μ D I D and S K = ( S K U N G 2 ) P W D . Eventually, the attacker can obtain an S K that can be used to access the resource of the gateway and the sensor node.

5.2. Privileged Insider Attack

If a privileged insider of the gateway has obtained the user A’s password P W D , D I D and R S G 1 from the gateway’s database, he is trying to impersonate user A. In the Mutual Authentication and Key Agreement Phase, the privileged insider retrieves N G 2 = μ D I D and S K = ( S K U N G 2 ) P W D . Eventually, the privileged insider can obtain an S K that can access the resource of the gateway and the sensor node.

5.3. Replay Attack

Masud et al. [6] claim their scheme is safe from replay attacks because the gateway checks the freshness of nonce N D 1 * = N D P W D and that the nonce cannot be modified since it is secretly enclosed in the password P W D . However, suppose the attacker generates the nonce N A and then transmits ( N A , D T I D , λ , S T I D ) instead of ( N D , D T I D , λ , S T I D ) . Upon receiving ( N A , D T I D , λ , S T I D ) , the gateway retrieves N D 1 * = N A P W D and then the gateway checks the freshness of N D 1 * . However, since the retrieved N D 1 * is a random number if only freshness is guaranteed, the gateway cannot confirm whether N D 1 * is valid. Briefly, if the attacker can make a nonce that can guarantee freshness, Masud et al. [6]’s scheme cannot resist replay attacks. Further, if freshness is proven since the new identities of user and device D T I D n e w , S T I D n e w are changed, valid users who do not know the changed identity D T I D n e w will no longer be able to authenticate themselves after the replay attack.

6. Proposed Scheme

In this section, we propose a three-factor mutual authentication scheme for the Internet of Medical Things (IoMT) that is intended to overcome the weaknesses of the scheme reported by Masud and colleagues. The proposed scheme only consists of three phases: user registration, sensor node registration, and authentication and key distribution. The proposed scheme is described in Table 4.
Table 4. The proposed scheme.

6.1. User Registration Phase

1.
The user enters I D i and P W D and generates a random number r U 1 . The user imprints B i on a device for biometric collection and computes G e n ( B i ) = ( R i , R b i ) and H P W i = h ( P W i R i r U 1 ) . For registration, the user transmits I D i through a secured channel to the gateway.
2.
The gateway generates random numbers r G W 1 , r G W 2 and r G W 3 and computes T I D i = h ( I D i r G W 1 K G W ) , S i 1 = h ( I D i r G W 2 K G W ) and S i 2 = h ( I D i r G W 3 K G W ) . The gateway stores I D i , T I D i , S i 1 and S i 2 . S i 2 is temporarily stored by the gateway until the sensor node registration phase, is transferred from the gateway to the sensor node during the sensor node registration phase, and is then deleted from the gateway. Finally, the gateway transmits T I D i , S i 1 , and S i 2 through a secured channel to the user.
3.
The user computes U i M 1 = T I D i H P W i , U i M 2 = S i 1 H P W i and U i M 3 = S i 2 H P W i , U i M 4 = h ( P W i R i I D i ) r U 1 and U i M 5 = h ( r U 1 T I D i S i 1 S i 2 ) and stores U i M 1 , U i M 2 , U i M 3 , U i M 4 , and U i M 5 .

6.2. Sensor Node Registration Phase

1.
For registration, the sensor node transmits S I D j through a secured channel to the gateway.
2.
The gateway generates a random number r G W 4 and computes T S I D j = h ( S I D j r G W 4 K G W ) and stores S I D j , T S I D j . Finally, the gateway transmits T S I D j , T I D i , and S i 2 through a secured channel to the sensor node and deletes S i 2 .
3.
The sensor node stores S I D j , T S I D j , T I D i , and S i 2 .

6.3. Mutual Authentication and Key Distribution Phase

1.
The user enters I D i and P W i and imprints B i on a device for biometric collection and computes R i = R e p ( B i , R b i ) , r U 1 = h ( P W i R i I D i ) U i M 4 , H P W i = h ( P W i R i r U 1 ) , T I D i = U i M 1 H P W i , S i 1 = U i M 2 H P W i , S i 2 = U i M 3 H P W i and U i M 5 * = h ( r U 1 T I D i S i 1 S i 2 ) . To check the user’s password, the user checks if U i M 5 = ? U i M 5 * . If the equation is equal, the password check is passed; if not, the procedure is stopped. To generate an authentication message, the user generates r U 2 , r U 3 and t s U and computes U i M 6 = r U 2 S i 1 , U i M 7 = r U 3 S i 2 and U i M 8 = h ( r U 2 T I D i t s U ) . Finally the user transmits U i M 6 , U i M 7 , U i M 8 , T I D i and t s U through a public channel to the gateway.
2.
To authenticate the user, the gateway retrieves r U 2 = U i M 6 S i 1 and computes U i M 8 * = h ( r U 2 T I D i t s U ) . The gateway checks r U 2 ’s freshness and if U i M 8 = ? U i M 8 * . The gateway also checks for whether or not t s U is a valid range. If U i M 8 * and t s U are valid, the user verification is passed; if not, the procedure is stopped. To generate the authentication message, the gateway generates r G W 5 and computes T I D i n e w = h ( I D i r G W 5 K G W ) , G M 1 = T S I D j r G W 5 , G M 2 = T I D i r G W 5 , G M 3 = T I D i n e w r G W 5 and G M 4 = h ( r G W 5 T S I D j T I D i T I D i n e w ) . Finally the gateway transmits G M 1 , G M 2 , G M 3 , G M 4 , and U i M 7 through a public channel to the sensor node.
3.
To authenticate the gateway, the sensor node retrieves r G W 5 = G M 1 T S I D j , T I D i = G M 2 r G W 5 , T I D i n e w = G M 3 r G W 5 and r U 3 = U i M 7 S i 2 then computes G M 4 * = h ( r G W 5 T S I D j T I D i T I D i n e w ) . The sensor node checks G M 4 = ? G M 4 * . If the equation is equal, the gateway verification is passed; if not, the procedure is stopped. To generate the session key S K , the sensor node generates S K and computes S N j M 1 = S K S i 2 , S N j M 2 = h ( S K T I D i n e w r U 3 ) and S N j M 3 = h ( S N j M 1 S N j M 2 T S I D j ) . The sensor node replaces T I D i by T I D i n e w . Finally, the sensor node transmits S N j M 1 , S N j M 2 and S N j M 3 through a public channel to the gateway.
4.
To authenticate the sensor node, the gateway computes S N j M 3 * = h ( S N j M 1 S N j M 2 T S I D j ) and checks if S N j M 3 = ? S N j M 3 * . If the equation is equal, the sensor node verification is passed. To generates an authentication message, the gateway computes G M 5 = h ( T I D i T I D i n e w ) and G M 6 = T I D i n e w S i 1 and replaces T I D i by T I D i n e w . Finally, the gateway transmits G M 5 , G M 6 , S N j M 1 and S N j M 2 through a public channel to the user.
5.
To authenticate the gateway, the user computes T I D i n e w = G M 6 S i 1 , G M 5 * = h ( T I D i T I D i n e w ) and U i M 1 n e w = T I D i n e w H P W i . The user checks if G M 5 = ? G M 5 * . If the equation is equal, the gateway verification is passed; if not, the procedure is stopped. To obtain the session key S K , the user retrieves S K = S N j M 1 S i 2 and computes S N j M 2 * = h ( S K T I D i n e w r U 3 ) . The user checks S N j M 2 = ? S N j M 2 * . If the equation is equal, the user obtains the valid session key S K ; if not, the procedure is stopped.

7. Security Analysis of the Proposed Scheme

In this section, we demonstrate formal and informal security analysis. We use the security verification tool ProVerif to demonstrate that the proposed scheme can satisfy security and authentication features. As an informal security analysis, we show how our proposed scheme meets the security requirements for an IoMT sensor protocol.

7.1. Formal Security Analysis

In this section, the ProVerif tool [23] is used to evaluate the security of the proposed protocol. ProVerif tool is an automatic cryptographic protocol verifier that was developed by Bruno Blanchet [13]. Several studies have used this tool to demonstrate the safety of their protocols [24,25].
We use two types, and four channels in total. Private channel1 and Private channel2 transmit sensitive data between the user and the gateway and between the gateway and the sensor node, respectively. Public channel1 and Public channel2 transmit general data between the user and the gateway and between the gateway and the sensor node, respectively. Table 5 presents the definitions of the channels, variables, and other related parameters. The processes performed by the user, the gateway, and the sensor node are presented in Table 6, Table 7 and Table 8, respectively. Lastly, the queries and main process are detailed in Table 9.
Table 5. Definitions of channels, variables and other related parameters.
Table 6. User’s process.
Table 7. Gateway’s process.
Table 8. Sensor node’s process.
Table 9. Queries and main process.
The results of our proposed scheme are presented in Table 10. It can be seen that the proposed protocol kept the session key S K safe from the attacker.
Table 10. Result.
When we run the following query in Table 9, we can obtain the following results:
1.
Query inj–event(endEVENTA) ==> inj-event(startEVENTA) is true.
2.
Query inj–event(endEVENTB) ==> inj-event(startEVENTB) is false.
3.
Query not attacker(M) is true.
4.
Query not attacker(M) is false.
“Query inj-event (endEVENTA) == > inj-event (startEVENTA) is true.” means that the process from endEVENTA to startEVENTA has been authenticated. By contrast, “Query inj-event (endEVENTB) == > inj-event (startEVENTB) is false.” means that the authentication from endEVENTB to startEVENTB is not successful. “Query not attacker (M) is true.” means that an attacker cannot acquire a free name M. Finally, “Query not attacker (M) is false.” means that an attacker can trace the M.
The query results from Table 9 are listed in Table 10.

7.2. Informal Security Analysis

We performed a formal analysis. However, a formal analysis by itself is not sufficient to prove safety [13,26,27]. Therefore, we further analyzed our scheme using an informal analysis. We present a theoretical analysis of the proposed scheme. The results of the informal security analysis are then briefly described.
1.
Offline Password Guessing Attack: Since our scheme uses biometric information B i with the unique biological characteristics of individuals that are not stored for user authentication, it is impossible to guess a user’s password without a real user. Therefore our scheme can protect against the offline password guessing attack.
2.
Privileged Insider Attack: Even if the privileged insider steals I D i , T I D i , S I D j , T S I D j , and S i 1 from the gateway’s database, the privileged insider can not obtain the session key SK without secret information S i 2 that is shared between the user and the sensor node. Therefore our scheme can protect against privileged insider attacks.
3.
User Impersonation Attack: Even if the attacker steals and replaces the user’s T I D i , the attacker can not generate valid U i M 6 and U i M 7 without secret information S i 1 and S i 2 . When the gateway and the sensor node verify U i M 6 and U i M 7 , respectively, they can find the invalid user. Therefore our scheme can protect against user impersonation attacks.
4.
Server Impersonation Attack: Even if the attacker impersonates the gateway, the attacker does not generate valid G M 4 and G M 5 without T S I D j and S i 1 . When the sensor node and the user verify G M 4 and G M 5 , respectively, they can find the invalid gateway. Therefore our scheme can protect against server impersonation attacks.
5.
Replay Attack: Even if the attacker steals U i M 6 , U i M 7 , U i M 8 , and T I D i from a successful mutual authentication and key distribution phase and then resends it to the gateway, the gateway can find whether or not the message is reused because the gateway checks r U 2 ’s freshness. Moreover, the attacker can not generate and modify r U 2 and U i M 6 without S i 1 . Therefore our scheme can protect against replay attacks.
6.
Man-in-the-Middle Attack: In a man-in-the-middle attack, an attacker puts themselves in the middle of two parties so that they can intercept and modify some communicated data to masquerade as the entities. In the mutual authentication and key distribution phase, the attacker intercepts communicated data between the user and the gateway and attempts to modify the message to retrieve the session key. However, in our scheme, the attacker can not modify communicated messages without the secret information S i 1 and S i 2 . Therefore our scheme can protect against man-in-the-middle attacks.
7.
Session Key Disclosure Attack: Even if the attacker obtains S N j M 1 which includes the session key S K , the attacker can not obtain the session key without the secret information S i 2 . Therefore, our scheme can protect against session key disclosure attacks.
8.
Forward Secrecy and Backward Secrecy: Even if someone gains the session key S K , they can not know the old session key or the new session key because each session key is generated randomly with no relation to the other session keys. Therefore our scheme can preserve forward secrecy and backward secrecy.
9.
Mutual Authentication: The gateway and the user can authenticate each other by verifying U i M 8 and G M 5 respectively, using the secret information S i 1 . Therefore our scheme provides mutual authentication.
10.
User Anonymity: Our scheme identifies users using T I D i and then replaces it every time with T I D i n e w regardless of the old T I D i . Therefore our scheme preserves user anonymity.
The results of the security analysis with comparisons to related papers are presented in Table 11.
Table 11. Comparisons of the security features.

8. Performance Analysis of the Proposed Scheme

Many authentication studies have analyzed their performance in the following manner [9,10,11,12,13,14,15,20,21,22,24,25,26,27,28,29,30,31,32]. We compared each computation amount in terms of the research methods used. We analyze the performance of our scheme as follows.
Our study analyzes the computational cost using the time measurement presented in Table 12 [28,29]. T M stands for the computational cost of multiplication in the field. T b h stands for the computational cost of the biohash function operation, and T h stands for the computational cost of the one-way hash function operation. It is assumed that the XOR operation does not affect the cost of operation. Table 13 and Figure 2 compare the computational cost of our scheme with those of other schemes according to Table 12 [6,12,15].
Table 12. Computational cost of cryptographic calculations (ms).
Table 13. Comparisons of computational cost.
Figure 2. Graph comparisons of computational cost [6,12,15].
We calculate the computational efficiency of our scheme as follows:
( t 1 t 2 ) / t 2
In Formula (3), t 1 represents the average cost of computation of the different schemes. Moreover, t 2 represents the cost of operation of our scheme.
According to the above formula, the operation of our scheme is 266.48% more efficient in terms of computational cost than the other schemes, and Table 11 shows that our scheme is more secure than the other methods.

9. Discussion of Performance

We proposed a secure and lightweight user authentication scheme for IoMT by improving Masud et al. [6]’s scheme. We compared the performance of three schemes [6,12,15] in Section 8. Our scheme outperforms [12,15] by 399.73% and 499.66% respectively. The performance of [6] is lightweight, but it does not meet basic security requirements such as offline password guessing attacks, privileged insider attacks, and replay attacks. Therefore, our scheme is a suitable lightweight user authentication scheme for IoMT because our scheme not only is improved by addressing the security threats of [6] but also outperforms 266.48% more efficiently than the other schemes.

10. Conclusions

The purpose of our paper was to propose a secure and lightweight user authentication scheme for IoMT by addressing the security threats to which Masud et al. [6]’s scheme is vulnerable. In particular, our scheme can protect against well-known attacks in IoMT i.e., offline password guessing attacks, privileged insider attacks, user impersonation attacks, replay attacks, and session key disclosure attacks, and it ensures user anonymity. We also proved that our scheme is a suitable user authentication scheme for IoMT through formal security analysis by ProVerif. Moreover, we proposed a lightweight security protocol that mainly uses a hash function and XOR operation considering low-spec healthcare sensors. As a result, we showed 266.48% better performance than the average computational cost of the considered schemes [6,12,15]. Our scheme outperforms [12,15], but it does not outperform [6]. Our scheme shows higher safety than the compared schemes [6,12,15]. Our security and performance analysis shows that our scheme is a suitable lightweight user authentication scheme for IoMT. Further studies will be able to improve convenience by combining behavioral biometrics authentication. Behavioral biometric authentication is expected to achieve further improved convenience over biometrics authentication because it uses keystroke dynamics, gait analysis, mouse use characteristics, signature analysis, and cognitive biometrics.

Author Contributions

Conceptualization, K.K.; Methodology, K.K., J.R. and Y.L.; Software, K.K.; Validation, J.R.; Formal analysis, K.K. and Y.L.; Writing—original draft, K.K. and J.R.; Writing—review and editing, J.R., Y.L. and D.W.; Supervision, D.W.; Funding acquisition, D.W. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

Thiswork was supported by an Institute of Information & Communications Technology Planning Evaluation (IITP) grant funded by the Korea government (MSIT) (No. 2021-0-00558, Development of National Statistical Analysis System using Homomorphic Encryption Technology).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Jha, N.K. Internet-of-Medical-Things. In Proceedings of the Great Lakes Symposium on VLSI (GLSVLSI), Banff, AB, Canada, 10–12 May 2017; p. 7. [Google Scholar]
  2. Hatzivasilis, G.; Soultatos, O.; Ioannidis, S.; Verikoukis, C.; Demetriou, G.; Tsatsoulis, C. Review of security and privacy for the Internet of Medical Things (IoMT). In Proceedings of the 2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS), Santorini Island, Greece, 29–31 May 2019; pp. 457–464. [Google Scholar]
  3. Dilibal, C.; Davis, B.L.; Chakraborty, C. Generative design methodology for internet of medical things (IoMT)-based wearable biomedical devices. In Proceedings of the 2021 3rd International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), Ankara, Turkey, 11–13 June 2021; pp. 1–4. [Google Scholar]
  4. Aman, A.H.M.; Hassan, W.H.; Sameen, S.; Attarbashi, Z.S.; Alizadeh, M.; Latiff, L.A. IoMT amid COVID-19 pandemic: Application, architecture, technology, and security. J. Netw. Comput. Appl. 2021, 174, 102886. [Google Scholar] [CrossRef] [PubMed]
  5. Khadidos, A.O.; Shitharth, S.; Khadidos, A.O.; Sangeetha, K.; Alyoubi, K.H. Healthcare Data Security Using IoT Sensors Based on Random Hashing Mechanism. J. Sens. 2022, 2022, 8457116. [Google Scholar] [CrossRef]
  6. Masud, M.; Gaba, G.S.; Choudhary, K.; Hossain, M.S.; Alhamid, M.F.; Muhammad, G. Lightweight and anonymity-preserving user authentication scheme for IoT-based healthcare. IEEE Internet Things J. 2021, 9, 2649–2656. [Google Scholar] [CrossRef]
  7. Lamport, L. Password authentication with insecure communication. Commun. ACM 1981, 24, 770–772. [Google Scholar] [CrossRef]
  8. Liao, I.E.; Lee, C.C.; Hwang, M.S. A password authentication scheme over insecure networks. J. Comput. Syst. Sci. 2006, 72, 727–740. [Google Scholar] [CrossRef]
  9. Wu, Z.Y.; Lee, Y.C.; Lai, F.; Lee, H.C.; Chung, Y. A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 2012, 36, 1529–1535. [Google Scholar] [CrossRef]
  10. Debiao, H.; Jianhua, C.; Rui, Z. A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 2012, 36, 1989–1995. [Google Scholar] [CrossRef]
  11. Wei, J.; Hu, X.; Liu, W. An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 2012, 36, 3597–3604. [Google Scholar] [CrossRef]
  12. Wu, F.; Xu, L.; Kumari, S.; Li, X. An improved and provably secure three-factor user authentication scheme for wireless sensor networks. Peer-Peer Netw. Appl. 2018, 11, 1–20. [Google Scholar] [CrossRef]
  13. Ryu, J.; Lee, H.; Kim, H.; Won, D. Secure and efficient three-factor protocol for wireless sensor networks. Sensors 2018, 18, 4481. [Google Scholar] [CrossRef]
  14. Mao, D.; Liu, H.; Zhang, W. An enhanced three-factor authentication scheme with dynamic verification for medical multimedia information systems. IEEE Access 2019, 7, 167683–167695. [Google Scholar] [CrossRef]
  15. Li, X.; Peng, J.; Obaidat, M.S.; Wu, F.; Khan, M.K.; Chen, C. A secure three-factor user authentication protocol with forward secrecy for wireless medical sensor network systems. IEEE Syst. J. 2019, 14, 39–50. [Google Scholar] [CrossRef]
  16. Ebrahimi, S.; Bayat–Sarmadi, S. Lightweight fuzzy extractor based on LPN for device and biometric authentication in IoT. IEEE Internet Things J. 2021, 8, 10706–10713. [Google Scholar] [CrossRef]
  17. Satamraju, K.P.; Malarkodi, B. A PUF-based mutual authentication protocol for internet of things. In Proceedings of the 2020 5th International Conference on Computing, Communication and Security (ICCCS), Patna, India, 14–16 October 2020; pp. 1–6. [Google Scholar]
  18. Abdaoui, A.; Erbad, A.; Al-Ali, A.K.; Mohamed, A.; Guizani, M. Fuzzy Elliptic Curve Cryptography for Authentication in Internet of Things. IEEE Internet Things J. 2021, 9, 9987–9998. [Google Scholar] [CrossRef]
  19. Dodis, Y.; Reyzin, L.; Smith, A. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, 2–6 May 2004; pp. 523–540. [Google Scholar]
  20. Ryu, J.; Lee, H.; Lee, Y.; Won, D. SMASG: Secure Mobile Authentication Scheme for Global Mobility Network. IEEE Access 2022, 10, 26907–26919. [Google Scholar] [CrossRef]
  21. Kang, D.; Lee, H.; Lee, Y.; Won, D. Lightweight user authentication scheme for roaming service in GLOMONET with privacy preserving. PLoS ONE 2021, 16, e0247441. [Google Scholar] [CrossRef]
  22. Ryu, J.; Kang, D.; Lee, H.; Kim, H.; Won, D. A secure and lightweight three-factor-based authentication scheme for smart healthcare systems. Sensors 2020, 20, 7136. [Google Scholar] [CrossRef]
  23. Blanchet, B.; Smyth, B.; Cheval, V.; Sylvestre, M. ProVerif 2.04: Automatic Cryptographic Protocol Verifier, User Manual and Tutorial. Available online: https://proverif.inria.fr/manual.pdf (accessed on 30 November 2021).
  24. Kang, D.; Jung, J.; Lee, D.; Kim, H.; Won, D. Security analysis and enhanced user authentication in proxy mobile IPv6 networks. PLoS ONE 2017, 12, e0181031. [Google Scholar] [CrossRef]
  25. Roy, S.; Chatterjee, S.; Das, A.K.; Chattopadhyay, S.; Kumari, S.; Jo, M. Chaotic map–based anonymous user authentication scheme with user biometrics and fuzzy extractor for crowdsourcing Internet of Things. IEEE Internet Things J. 2017, 5, 2884–2895. [Google Scholar] [CrossRef]
  26. Lee, H.; Lee, D.; Moon, J.; Jung, J.; Kang, D.; Kim, H.; Won, D. An improved anonymous authentication scheme for roaming in ubiquitous networks. PLoS ONE 2018, 13, e0193366. [Google Scholar] [CrossRef]
  27. Jung, J.; Kim, J.; Choi, Y.; Won, D. An anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in wireless sensor networks. Sensors 2016, 16, 1299. [Google Scholar] [CrossRef] [PubMed]
  28. Xu, L.; Wu, F. Cryptanalysis and improvement of a user authentication scheme preserving uniqueness and anonymity for connected health care. J. Med. Syst. 2015, 39, 1–9. [Google Scholar] [CrossRef] [PubMed]
  29. Das, A.K. A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks. Peer-Peer Netw. Appl. 2016, 9, 223–244. [Google Scholar] [CrossRef]
  30. Sahoo, S.S.; Mohanty, S.; Majhi, B. An efficient three-factor user authentication scheme for industrial wireless sensor network with fog computing. Int. J. Commun. Syst. 2022, 35, 3. [Google Scholar] [CrossRef]
  31. Bahache, A.N.; Chikouche, N.; Mezrag, F. Authentication Schemes for Healthcare Applications Using Wireless Medical Sensor Networks: A Survey. SN Comput. Sci. 2022, 3, 1–25. [Google Scholar] [CrossRef]
  32. Li, Y.; Tian, Y. A Lightweight and Secure Three-Factor Authentication Protocol With Adaptive Privacy-Preserving Property for Wireless Sensor Networks. IEEE Syst. J. 2022, 16, 6197–6208. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.